Phishing analysisFile system checks and memory dumpIoc editing and searching
Good Practice On
- Evidence acquisition and retention
- Secops scripting (bash, vbscript, Powershell, python)
- Threat intelligence and OSINT.
- Support the cybersecurity policies and procedures definition (especially Security Incident Management)
Eager to learn, curious mind to find threats, discover backdoors, find attack vectors, talented to build and show samples for scratch
Highly effective communication skills and be capable of presenting data clearly to various audience
Excellent written and verbal English
Ability to work within complex teams and in an international environment.
Desirable Requirements
Certifications: Blue Team Level 1 (BTL1), Blue Team Level 2 (BTL2), eCTHP, eCIR, GCIH, SC-200, , AZ-500, AZ-900, Certified CyberDefender (CCD) or similar.
Experience in cybersecurity governance, including the development and alignment of policies, frameworks and compliance strategies.
What do we offer?
- A stimulating international environment. You will never get bored!